callback( { "result":{ "query":":facetid:toc:\"db/journals/csur/csur43.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"62.54" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"36", "@dc":"36", "@oc":"36", "@id":"43432497", "text":":facetid:toc:db/journals/csur/csur43.bht" } }, "hits":{ "@total":"36", "@computed":"36", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"4552275", "info":{"authors":{"author":[{"@pid":"a/JakeKAggarwal","text":"J. K. Aggarwal"},{"@pid":"r/MichaelSRyoo","text":"Michael S. Ryoo"}]},"title":"Human activity analysis: A review.","venue":"ACM Comput. Surv.","volume":"43","number":"3","pages":"16:1-16:43","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/AggarwalR11","doi":"10.1145/1922649.1922653","ee":"https://doi.org/10.1145/1922649.1922653","url":"https://dblp.org/rec/journals/csur/AggarwalR11"}, "url":"URL#4552275" }, { "@score":"1", "@id":"4552276", "info":{"authors":{"author":[{"@pid":"26/9","text":"Alsayed Algergawy"},{"@pid":"48/4862","text":"Marco Mesiti"},{"@pid":"99/1071","text":"Richi Nayak"},{"@pid":"s/GunterSaake","text":"Gunter Saake"}]},"title":"XML data clustering: An overview.","venue":"ACM Comput. Surv.","volume":"43","number":"4","pages":"25:1-25:41","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/AlgergawyMNS11","doi":"10.1145/1978802.1978804","ee":"https://doi.org/10.1145/1978802.1978804","url":"https://dblp.org/rec/journals/csur/AlgergawyMNS11"}, "url":"URL#4552276" }, { "@score":"1", "@id":"4552277", "info":{"authors":{"author":[{"@pid":"81/2856","text":"Torsten Anders"},{"@pid":"84/752","text":"Eduardo Reck Miranda"}]},"title":"Constraint programming systems for modeling music theories and composition.","venue":"ACM Comput. Surv.","volume":"43","number":"4","pages":"30:1-30:38","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/AndersM11","doi":"10.1145/1978802.1978809","ee":"https://doi.org/10.1145/1978802.1978809","url":"https://dblp.org/rec/journals/csur/AndersM11"}, "url":"URL#4552277" }, { "@score":"1", "@id":"4552278", "info":{"authors":{"author":{"@pid":"46/5015","text":"Steffen van Bakel"}},"title":"Strict intersection types for the Lambda Calculus.","venue":"ACM Comput. Surv.","volume":"43","number":"3","pages":"20:1-20:49","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/Bakel11","doi":"10.1145/1922649.1922657","ee":"https://doi.org/10.1145/1922649.1922657","url":"https://dblp.org/rec/journals/csur/Bakel11"}, "url":"URL#4552278" }, { "@score":"1", "@id":"4552279", "info":{"authors":{"author":[{"@pid":"14/3352","text":"Patricia Beatty"},{"@pid":"27/2195","text":"Ian Reay"},{"@pid":"72/91","text":"Scott Dick"},{"@pid":"44/7043-1","text":"James Miller 0001"}]},"title":"Consumer trust in e-commerce web sites: A meta-study.","venue":"ACM Comput. Surv.","volume":"43","number":"3","pages":"14:1-14:46","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/BeattyRDM11","doi":"10.1145/1922649.1922651","ee":"https://doi.org/10.1145/1922649.1922651","url":"https://dblp.org/rec/journals/csur/BeattyRDM11"}, "url":"URL#4552279" }, { "@score":"1", "@id":"4552280", "info":{"authors":{"author":[{"@pid":"35/985","text":"Pimwadee Chaovalit"},{"@pid":"g/AryyaGangopadhyay","text":"Aryya Gangopadhyay"},{"@pid":"19/3943","text":"George Karabatis"},{"@pid":"192/0196-3","text":"Zhiyuan Chen 0003"}]},"title":"Discrete wavelet transform-based time series analysis and mining.","venue":"ACM Comput. Surv.","volume":"43","number":"2","pages":"6:1-6:37","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/ChaovalitGKC11","doi":"10.1145/1883612.1883613","ee":"https://doi.org/10.1145/1883612.1883613","url":"https://dblp.org/rec/journals/csur/ChaovalitGKC11"}, "url":"URL#4552280" }, { "@score":"1", "@id":"4552281", "info":{"authors":{"author":[{"@pid":"56/2299","text":"Sergio Damas"},{"@pid":"34/6784","text":"Oscar Cordón"},{"@pid":"53/659","text":"Óscar Ibáñez"},{"@pid":"59/6229","text":"José Santamaría"},{"@pid":"59/10323","text":"Inmaculada Alemán"},{"@pid":"33/3741","text":"Miguel Botella"},{"@pid":"03/7527","text":"Fernando Navarro"}]},"title":"Forensic identification by computer-aided craniofacial superimposition: A survey.","venue":"ACM Comput. Surv.","volume":"43","number":"4","pages":"27:1-27:27","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/DamasCISABN11","doi":"10.1145/1978802.1978806","ee":"https://doi.org/10.1145/1978802.1978806","url":"https://dblp.org/rec/journals/csur/DamasCISABN11"}, "url":"URL#4552281" }, { "@score":"1", "@id":"4552282", "info":{"authors":{"author":[{"@pid":"44/5372","text":"Robert I. Davis 0001"},{"@pid":"b/AlanBurns","text":"Alan Burns 0001"}]},"title":"A survey of hard real-time scheduling for multiprocessor systems.","venue":"ACM Comput. Surv.","volume":"43","number":"4","pages":"35:1-35:44","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/DavisB11","doi":"10.1145/1978802.1978814","ee":"https://doi.org/10.1145/1978802.1978814","url":"https://dblp.org/rec/journals/csur/DavisB11"}, "url":"URL#4552282" }, { "@score":"1", "@id":"4552283", "info":{"authors":{"author":{"@pid":"45/5314","text":"Yuhui Deng"}},"title":"What is the future of disk drives, death or rebirth?","venue":"ACM Comput. Surv.","volume":"43","number":"3","pages":"23:1-23:27","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/Deng11","doi":"10.1145/1922649.1922660","ee":"https://doi.org/10.1145/1922649.1922660","url":"https://dblp.org/rec/journals/csur/Deng11"}, "url":"URL#4552283" }, { "@score":"1", "@id":"4552284", "info":{"authors":{"author":[{"@pid":"02/3940","text":"Elias P. Duarte Jr."},{"@pid":"86/5600","text":"Roverli Pereira Ziwich"},{"@pid":"78/5871","text":"Luiz Carlos Pessoa Albini"}]},"title":"A survey of comparison-based system-level diagnosis.","venue":"ACM Comput. Surv.","volume":"43","number":"3","pages":"22:1-22:56","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/DuarteZA11","doi":"10.1145/1922649.1922659","ee":"https://doi.org/10.1145/1922649.1922659","url":"https://dblp.org/rec/journals/csur/DuarteZA11"}, "url":"URL#4552284" }, { "@score":"1", "@id":"4552285", "info":{"authors":{"author":{"@pid":"09/4308","text":"Roland Ducournau"}},"title":"Implementing statically typed object-oriented programming languages.","venue":"ACM Comput. Surv.","volume":"43","number":"3","pages":"18:1-18:48","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/Ducournau11","doi":"10.1145/1922649.1922655","ee":"https://doi.org/10.1145/1922649.1922655","url":"https://dblp.org/rec/journals/csur/Ducournau11"}, "url":"URL#4552285" }, { "@score":"1", "@id":"4552286", "info":{"authors":{"author":[{"@pid":"89/536","text":"Davide Falessi"},{"@pid":"95/2139","text":"Giovanni Cantone"},{"@pid":"90/3774","text":"Rick Kazman"},{"@pid":"k/PhilippeKruchten","text":"Philippe Kruchten"}]},"title":"Decision-making techniques for software architecture design: A comparative survey.","venue":"ACM Comput. Surv.","volume":"43","number":"4","pages":"33:1-33:28","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/FalessiCKK11","doi":"10.1145/1978802.1978812","ee":"https://doi.org/10.1145/1978802.1978812","url":"https://dblp.org/rec/journals/csur/FalessiCKK11"}, "url":"URL#4552286" }, { "@score":"1", "@id":"4552287", "info":{"authors":{"author":[{"@pid":"f/FCFreiling","text":"Felix C. Freiling"},{"@pid":"g/RachidGuerraoui","text":"Rachid Guerraoui"},{"@pid":"k/PetrKouznetsov","text":"Petr Kuznetsov"}]},"title":"The failure detector abstraction.","venue":"ACM Comput. Surv.","volume":"43","number":"2","pages":"9:1-9:40","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/FreilingGK11","doi":"10.1145/1883612.1883616","ee":"https://doi.org/10.1145/1883612.1883616","url":"https://dblp.org/rec/journals/csur/FreilingGK11"}, "url":"URL#4552287" }, { "@score":"1", "@id":"4552288", "info":{"authors":{"author":[{"@pid":"37/934","text":"Wei Jie"},{"@pid":"21/8344","text":"Junaid Arshad"},{"@pid":"99/6289","text":"Richard O. Sinnott"},{"@pid":"48/917","text":"Paul Townend"},{"@pid":"90/3667","text":"Zhou Lei"}]},"title":"A review of grid authentication and authorization technologies and support for federated access control.","venue":"ACM Comput. Surv.","volume":"43","number":"2","pages":"12:1-12:26","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/JieASTL11","doi":"10.1145/1883612.1883619","ee":"https://doi.org/10.1145/1883612.1883619","url":"https://dblp.org/rec/journals/csur/JieASTL11"}, "url":"URL#4552288" }, { "@score":"1", "@id":"4552289", "info":{"authors":{"author":[{"@pid":"85/1259","text":"Sarvnaz Karimi"},{"@pid":"98/1631","text":"Falk Scholer"},{"@pid":"t/AndrewTurpin","text":"Andrew Turpin"}]},"title":"Machine transliteration survey.","venue":"ACM Comput. Surv.","volume":"43","number":"3","pages":"17:1-17:46","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/KarimiST11","doi":"10.1145/1922649.1922654","ee":"https://doi.org/10.1145/1922649.1922654","url":"https://dblp.org/rec/journals/csur/KarimiST11"}, "url":"URL#4552289" }, { "@score":"1", "@id":"4552290", "info":{"authors":{"author":[{"@pid":"181/2345","text":"Amy J. Ko"},{"@pid":"68/3208","text":"Robin Abraham"},{"@pid":"19/5080","text":"Laura Beckwith"},{"@pid":"54/582","text":"Alan F. Blackwell"},{"@pid":"b/MMBurnett","text":"Margaret M. Burnett"},{"@pid":"e/MErwig","text":"Martin Erwig"},{"@pid":"13/5036","text":"Christopher Scaffidi"},{"@pid":"65/2271","text":"Joseph Lawrance"},{"@pid":"39/3002","text":"Henry Lieberman"},{"@pid":"54/1970","text":"Brad A. Myers"},{"@pid":"r/MBRosson","text":"Mary Beth Rosson"},{"@pid":"25/6796","text":"Gregg Rothermel"},{"@pid":"93/5634","text":"Mary Shaw"},{"@pid":"66/3804","text":"Susan Wiedenbeck"}]},"title":"The state of the art in end-user software engineering.","venue":"ACM Comput. Surv.","volume":"43","number":"3","pages":"21:1-21:44","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/KoABBBESLLMRRSW11","doi":"10.1145/1922649.1922658","ee":"https://doi.org/10.1145/1922649.1922658","url":"https://dblp.org/rec/journals/csur/KoABBBESLLMRRSW11"}, "url":"URL#4552290" }, { "@score":"1", "@id":"4552291", "info":{"authors":{"author":[{"@pid":"40/4437","text":"Clémence Magnien"},{"@pid":"l/MLatapy","text":"Matthieu Latapy"},{"@pid":"94/4124","text":"Jean-Loup Guillaume"}]},"title":"Impact of random failures and attacks on Poisson and power-law random networks.","venue":"ACM Comput. Surv.","volume":"43","number":"3","pages":"13:1-13:31","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/MagnienLG11","doi":"10.1145/1922649.1922650","ee":"https://doi.org/10.1145/1922649.1922650","url":"https://dblp.org/rec/journals/csur/MagnienLG11"}, "url":"URL#4552291" }, { "@score":"1", "@id":"4552292", "info":{"authors":{"author":[{"@pid":"94/2990","text":"Laurie McLeod"},{"@pid":"93/39","text":"Stephen G. MacDonell"}]},"title":"Factors that affect software systems development project outcomes: A survey of research.","venue":"ACM Comput. Surv.","volume":"43","number":"4","pages":"24:1-24:56","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/McLeodM11","doi":"10.1145/1978802.1978803","ee":"https://doi.org/10.1145/1978802.1978803","url":"https://dblp.org/rec/journals/csur/McLeodM11"}, "url":"URL#4552292" }, { "@score":"1", "@id":"4552293", "info":{"authors":{"author":[{"@pid":"73/9582","text":"Kathleen McGill"},{"@pid":"98/1946","text":"Stephen Taylor"}]},"title":"Robot algorithms for localization of multiple emission sources.","venue":"ACM Comput. Surv.","volume":"43","number":"3","pages":"15:1-15:25","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/McgillT11","doi":"10.1145/1922649.1922652","ee":"https://doi.org/10.1145/1922649.1922652","url":"https://dblp.org/rec/journals/csur/McgillT11"}, "url":"URL#4552293" }, { "@score":"1", "@id":"4552294", "info":{"authors":{"author":[{"@pid":"60/5205","text":"Luca Mottola"},{"@pid":"65/4458","text":"Gian Pietro Picco"}]},"title":"Programming wireless sensor networks: Fundamental concepts and state of the art.","venue":"ACM Comput. Surv.","volume":"43","number":"3","pages":"19:1-19:51","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/MottolaP11","doi":"10.1145/1922649.1922656","ee":"https://doi.org/10.1145/1922649.1922656","url":"https://dblp.org/rec/journals/csur/MottolaP11"}, "url":"URL#4552294" }, { "@score":"1", "@id":"4552295", "info":{"authors":{"author":[{"@pid":"44/3613","text":"Changhai Nie"},{"@pid":"l/HaretonKNLeung","text":"Hareton Leung"}]},"title":"A survey of combinatorial testing.","venue":"ACM Comput. Surv.","volume":"43","number":"2","pages":"11:1-11:29","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/NieL11","doi":"10.1145/1883612.1883618","ee":"https://doi.org/10.1145/1883612.1883618","url":"https://dblp.org/rec/journals/csur/NieL11"}, "url":"URL#4552295" }, { "@score":"1", "@id":"4552296", "info":{"authors":{"author":[{"@pid":"87/6221","text":"Matthew Parris"},{"@pid":"34/5585","text":"Carthik A. Sharma"},{"@pid":"d/RonaldFDeMara","text":"Ronald F. DeMara"}]},"title":"Progress in autonomous fault recovery of field programmable gate arrays.","venue":"ACM Comput. Surv.","volume":"43","number":"4","pages":"31:1-31:30","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/ParrisSD11","doi":"10.1145/1978802.1978810","ee":"https://doi.org/10.1145/1978802.1978810","url":"https://dblp.org/rec/journals/csur/ParrisSD11"}, "url":"URL#4552296" }, { "@score":"1", "@id":"4552297", "info":{"authors":{"author":[{"@pid":"65/1416","text":"Simon Parsons"},{"@pid":"04/6342","text":"Juan A. Rodríguez-Aguilar"},{"@pid":"74/2158","text":"Mark Klein"}]},"title":"Auctions and bidding: A guide for computer scientists.","venue":"ACM Comput. Surv.","volume":"43","number":"2","pages":"10:1-10:59","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/ParsonsRK11","doi":"10.1145/1883612.1883617","ee":"https://doi.org/10.1145/1883612.1883617","url":"https://dblp.org/rec/journals/csur/ParsonsRK11"}, "url":"URL#4552297" }, { "@score":"1", "@id":"4552298", "info":{"authors":{"author":[{"@pid":"81/2446","text":"Anderson Rocha 0001"},{"@pid":"80/4900","text":"Walter J. Scheirer"},{"@pid":"08/6458","text":"Terrance E. Boult"},{"@pid":"g/SiomeGoldenstein","text":"Siome Goldenstein"}]},"title":"Vision of the unseen: Current trends and challenges in digital image and video forensics.","venue":"ACM Comput. Surv.","volume":"43","number":"4","pages":"26:1-26:42","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/RochaSBG11","doi":"10.1145/1978802.1978805","ee":"https://doi.org/10.1145/1978802.1978805","url":"https://dblp.org/rec/journals/csur/RochaSBG11"}, "url":"URL#4552298" }, { "@score":"1", "@id":"4552299", "info":{"authors":{"author":{"@pid":"s/FaribaSadri","text":"Fariba Sadri"}},"title":"Ambient intelligence: A survey.","venue":"ACM Comput. Surv.","volume":"43","number":"4","pages":"36:1-36:66","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/Sadri11","doi":"10.1145/1978802.1978815","ee":"https://doi.org/10.1145/1978802.1978815","url":"https://dblp.org/rec/journals/csur/Sadri11"}, "url":"URL#4552299" }, { "@score":"1", "@id":"4552300", "info":{"authors":{"author":[{"@pid":"s/TomasSkopal","text":"Tomás Skopal"},{"@pid":"15/5056","text":"Benjamin Bustos"}]},"title":"On nonmetric similarity search problems in complex domains.","venue":"ACM Comput. Surv.","volume":"43","number":"4","pages":"34:1-34:50","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/SkopalB11","doi":"10.1145/1978802.1978813","ee":"https://doi.org/10.1145/1978802.1978813","url":"https://dblp.org/rec/journals/csur/SkopalB11"}, "url":"URL#4552300" }, { "@score":"1", "@id":"4552301", "info":{"authors":{"author":[{"@pid":"87/1736","text":"Ferdous Ahmed Sohel"},{"@pid":"61/1339","text":"Gour C. Karmakar"},{"@pid":"d/LaurenceDooley","text":"Laurence S. Dooley"},{"@pid":"00/3214","text":"Mohammed Bennamoun"}]},"title":"Geometric distortion measurement for shape coding: A contemporary review.","venue":"ACM Comput. Surv.","volume":"43","number":"4","pages":"29:1-29:22","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/SohelKDB11","doi":"10.1145/1978802.1978808","ee":"https://doi.org/10.1145/1978802.1978808","url":"https://dblp.org/rec/journals/csur/SohelKDB11"}, "url":"URL#4552301" }, { "@score":"1", "@id":"4552302", "info":{"authors":{"author":[{"@pid":"06/7326","text":"Guido Urdaneta"},{"@pid":"63/6649","text":"Guillaume Pierre"},{"@pid":"s/MaartenvanSteen","text":"Maarten van Steen"}]},"title":"A survey of DHT security techniques.","venue":"ACM Comput. Surv.","volume":"43","number":"2","pages":"8:1-8:49","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/UrdanetaPS11","doi":"10.1145/1883612.1883615","ee":"https://doi.org/10.1145/1883612.1883615","url":"https://dblp.org/rec/journals/csur/UrdanetaPS11"}, "url":"URL#4552302" }, { "@score":"1", "@id":"4552303", "info":{"authors":{"author":[{"@pid":"91/6813","text":"Aline Carneiro Viana"},{"@pid":"63/5522","text":"Stephane Maag"},{"@pid":"91/3486","text":"Fatiha Zaïdi"}]},"title":"One step forward: Linking wireless self-organizing network validation techniques with formal testing approaches.","venue":"ACM Comput. Surv.","volume":"43","number":"2","pages":"7:1-7:36","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/VianaMZ11","doi":"10.1145/1883612.1883614","ee":"https://doi.org/10.1145/1883612.1883614","url":"https://dblp.org/rec/journals/csur/VianaMZ11"}, "url":"URL#4552303" }, { "@score":"1", "@id":"4552304", "info":{"authors":{"author":{"@pid":"18/3872","text":"Bang Wang"}},"title":"Coverage problems in sensor networks: A survey.","venue":"ACM Comput. Surv.","volume":"43","number":"4","pages":"32:1-32:53","year":"2011","type":"Journal Articles","access":"closed","key":"journals/csur/Wang11","doi":"10.1145/1978802.1978811","ee":"https://doi.org/10.1145/1978802.1978811","url":"https://dblp.org/rec/journals/csur/Wang11"}, "url":"URL#4552304" } ] } } } )